aboutsummaryrefslogtreecommitdiff
path: root/target/Kconfig
diff options
context:
space:
mode:
authorBabu Moger <babu.moger@amd.com>2024-10-24 17:18:23 -0500
committerPaolo Bonzini <pbonzini@redhat.com>2024-10-31 18:28:32 +0100
commit2ec282b8eaaddf5c136f7566b5f61d80288a2065 (patch)
treea2540c1fcf0f5e5b49da15cbae6781c7a547a20a /target/Kconfig
parent209b0ac12074341d0093985eb9ad3e7edb252ce5 (diff)
downloadqemu-2ec282b8eaaddf5c136f7566b5f61d80288a2065.zip
qemu-2ec282b8eaaddf5c136f7566b5f61d80288a2065.tar.gz
qemu-2ec282b8eaaddf5c136f7566b5f61d80288a2065.tar.bz2
target/i386: Expose bits related to SRSO vulnerability
Add following bits related Speculative Return Stack Overflow (SRSO). Guests can make use of these bits if supported. These bits are reported via CPUID Fn8000_0021_EAX. =================================================================== Bit Feature Description =================================================================== 27 SBPB Indicates support for the Selective Branch Predictor Barrier. 28 IBPB_BRTYPE MSR_PRED_CMD[IBPB] flushes all branch type predictions. 29 SRSO_NO Not vulnerable to SRSO. 30 SRSO_USER_KERNEL_NO Not vulnerable to SRSO at the user-kernel boundary. =================================================================== Link: https://www.amd.com/content/dam/amd/en/documents/corporate/cr/speculative-return-stack-overflow-whitepaper.pdf Link: https://www.amd.com/content/dam/amd/en/documents/epyc-technical-docs/programmer-references/57238.zip Signed-off-by: Babu Moger <babu.moger@amd.com> Link: https://lore.kernel.org/r/dadbd70c38f4e165418d193918a3747bd715c5f4.1729807947.git.babu.moger@amd.com Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'target/Kconfig')
0 files changed, 0 insertions, 0 deletions